Security analysis of cryptographically controlled access to XML documents

Bogdan Warinschi
PODS (2005), pp. 108-117

Abstract